Specifications
Table Of Contents
- Preface
- Health and safety
- Taking care of your phone
- Introducing your Vertu phone
- Getting started
- Setting up your phone
- Home screen and clock
- Security
- Call functions and Call Log
- Contacts
- Messages
- Vertu Services
- Calendar
- Camera
- Connectivity
- Working with the Internet
- Office Tools
- Gallery
- Home Network
- Media
- Maps
- Positioning
- Application Manager
- Personal Settings
- Accessories
- Maintenance
- Printing
- Troubleshooting
- Specifications
- Shortcuts
- Warranty and legal information
- Glossary
- Index

35
Security
View certificate details
You can only be sure of the correct identity of a server when the signature and validity
period of a server certificate have been checked.
To view certificate details, open a certificate folder, then select a certificate and
Options > Certificate details.
One of the following notes may appear:
Certificate trust settings
Select Menu > Ctrl. Panel > Settings > General > Security > Certificate
management.
Trusting a certificate means that you authorize it to verify Web pages, email servers,
software packages, and other data. Only trusted certificates can be used to verify
services and software.
To change the trust settings, select a certificate and Options > Trust settings. Scroll
to an application field, then press the scroll key to select Yes or No. You cannot
change the trust settings of a personal certificate.
Depending on the certificate, a list of applications that can use the certificate is
displayed.
Protected Content: Digital Rights Management (DRM)
Other devices can send you media files that are protected by usage rights and for which
you need activation keys. Some activation keys contain unique IDs that allow the media
file provider to track the sending device. Some providers use this service to reward
people who distribute their media files to others who buy usage rights for the files.
Protected content allows you to choose whether providers of media objects
protected by usage rights are allowed to track transfers and transactions of the objects.
1. Select Menu > Ctrl. Panel > Settings > General > Security > Protected
content.
2. To allow media file providers to track the files sent to you, select Yes in Track
protected object.
3. To save your setting, select Back.
Background
Content owners may use different types of digital rights management (DRM)
technologies to protect their intellectual property, including copyrights. This device
uses various types of DRM software to access DRM-protected content. With this
device, you can access content protected with WMDRM 10 and OMA DRM 2.0. If
certain DRM software fails to protect the content, content owners may ask that its
access to new DRM-protected content be revoked. Revocation may also prevent
renewal of the relevant DRM-protected content already in your device. Revocation of
DRM software does not affect the use of content protected by other types of DRM or
the use of non-DRM-protected content.
Certificate not
trusted
You have not set any application to use the certificate. You may
want to change the trust settings.
Expired
certificate
The period of validity has ended for the selected certificate.
Certificate not
valid yet
The period of validity has not yet begun for the selected
certificate.
Certificate
corrupted
The certificate cannot be used. Contact the certificate issuer.
IMPOR TANT: Even if the use of certificates makes the risks involved in remote
connections and software installation considerably smaller, they must be used
correctly in order to benefit from increased security. The existence of a
certificate does not offer any protection in itself; the certificate manager must
contain correct, authentic, or trusted certificates for increased security to be
available. Certificates have a limited lifetime. If Expired certificate or
Certificate not valid yet is displayed, even if the certificate should be valid,
check that the current date and time in your device are correct.
Before changing any certificate settings, you must make sure that you really
trust the certificate owner and that the certificate really belongs to the listed
owner.
Symbian installation New Symbian operating system application.
Internet Email and graphics.
App. Installation New Java application.
Online certif. check Online certificate status protocol.
VPN Applicable to the VPN.
License acquisition Options are Automatic or Confirm first
Allow usage reporting Yes or No
Track protected object Yes or No
License deletion “License store is not yet full. Delete licenses anyway?”
Options are Yes or No.